I sure wish people would start to think prior to pointing fingers anywhere. First and foremost, any transaction that occurs over the internet should be suspicious -- nothing is truly secure, unless both ends of the transaction occur on an internal network that is not connected to the outside internet (and even then unauthorized access and hacking can occur).

Fingers need to be pointing everywhere on this one...Apple needs to do better with security, consumers need to be more careful with their data and secure their hardware/software, banks need to do more to protect consumers, governments need to more proactively prosecute offenders, et cetera, et cetera. The whole system is in its infancy still. It will hopefully improve, but unless bad guys just instantly go away, problems like this will still exist regardless of the company at the center of the controversy.

Redcard, good hackers are taught to never leave any evidence. If you can't clean your tracks after you're done, it's best to not do it.

And ezstar, when I first started reading your article, I noticed that the writer was Granneman, and even more so... It was published on securityfocus! He used to write for us at sf. He's a hardcore Linux user. I think he's even written a few books on it.

But let me say. A majority of our servers are Linux based. Although, technically not called viruses, we still have loads of hackers who try to gain access. I guess they're trying to prove security sites aren't perfectly secure. Anywho, Linux based systems are just as commonly hacked into as others, i would say even more, when dealing with non ametuers.

I think most script kiddies these days even know how to exploit rootkits on servers, and those are just as dangerous.

There's some truth to that statement too though. I wouldn't want to go and install another entire operating system when my target is running the same os as me.

Anyways, this was off topic to begin with. This is about apple and how theyre realizing that their systems should probably be protected a bit more. I'm pretty positive they'll hire a white hat or two.

Oh yeah... That article was also written 8 years ago, a LOT has changed since then in terms of hardware exploitation